Toplam kayıt 68, listelenen: 21-40

      Künye Göre
      Eskil, M. T. & Sticklen, J. (2009). Integrating vendors into cooperative design practices. CoDesign, 5(3), 175-192. doi:10.1080/15710880902921224 [1]
      Eskil, M. T. (2014). Factored particle filtering with dependent and constrained partition dynamics for tracking deformable objects. Machine Vision and Applications, 25(7), 1825-1840. doi:10.1007/s00138-014-0634-1 [1]
      Eskil, M. T., Sticklen, J. & Radcliffe, C. (2008). The routine design–modular distributed modeling platform for distributed routine design and simulation-based testing of distributed assemblies. AI EDAM, 22(1), 1-18. doi:10.1017/S0890060408000012 [1]
      Flammini, M., Monaco, G., Moscardelli, L., Shalom, M. & Zaks, S. (2021). On the online coalition structure generation problem. Journal Of Artificial Intelligence Research, 72, 1215-1250. doi:10.1613/JAIR.1.12989 [1]
      İnan, A., Kantarcıoğlu, M., Ghinita, G. & Bertino, E. (2012). A hybrid approach to private record matching. IEEE Transactions on Dependable and Secure Computing, 9(5), 684-698. doi:10.1109/TDSC.2012.46 [1]
      İrsoy, O., Yıldız, O. T. & Alpaydın, A. İ. E. (2012). Design and analysis of classifier learning experiments in bioinformatics: Survey and case studies. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), 9(6), 1663-1675. doi:10.1109/TCBB.2012.117 [1]
      Koray, A., Toprak, C., Esgel, V. & Yıldız, O. T. (2018). Construction of a turkish proposition bank. Turkish Journal of Electrical Engineering and Computer Sciences, 26(1), 570-581. doi:10.3906/elk-1703-79 [1]
      Koulali, I. & Eskil, M. T. (2021). Unsupervised textile defect detection using convolutional neural networks. Applied Soft Computing, 113, 1-17. doi:10.1016/j.asoc.2021.107913 [1]
      Najafi, A., Gholipour-Shilabin, A., Dehkharghani, R., Mohammadpur-Fard, A. & Asgari-Chenaghlu, M. (2023). ComStreamClust: a communicative multi-agent approach to text clustering in streaming data. Annals of Data Science, 10(6) 1583-1605. doi:10.1007/s40745-022-00426-4 [1]
      Okutan, A. & Yıldız, O. T. (2014). Software defect prediction using bayesian networks. Empirical Software Engineering, 19(1), 154-181. doi:10.1007/s10664-012-9218-8 [1]
      Okutan, A. & Yıldız, O. T. (2016). A novel kernel to predict software defectiveness. The Journal of Systems and Software, 119, 109-121. doi:10.1016/j.jss.2016.06.006 [1]
      Rhouma, R., Solak, E. & Belghith, S. (2010). Cryptanalysis of a new substitution–diffusion based image cipher. Communications in Nonlinear Science and Numerical Simulation, 15(7), 1887-1892. doi:10.1016/j.cnsns.2009.07.007 [1]
      Rhouma, R., Solak, E., Arroyo, D., Li, S., Alvarez, G. & Belghith, S. (2009). Comment on “Modified baptista type chaotic cryptosystem via matrix secret key” [phys. lett. A 372 (2008) 5427]. Physics Letters A, 373(37), 3398-3400. doi:10.1016/j.physleta.2009.07.035 [1]
      Solak, E. & Çokal, C. (2008). Comment on "encryption and decryption of images with chaotic map lattices" [ chaos 16 , 033118 ( 2006 ) ]. Chaos: An Interdisciplinary Journal of Nonlinear Science, 18(3), 1-4. doi:10.1063/1.2966114 [1]
      Solak, E. & Çokal, C. (2008). Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps. Physics Letters A, 372(46), 6922-6924. doi:10.1016/j.physleta.2008.10.022 [1]
      Solak, E. & Çokal, C. (2009). Algebraic break of a cryptosystem based on discretized two-dimensional chaotic maps. Physics Letters A, 373(15), 1352-1356. doi:10.1016/j.physleta.2009.02.024 [1]
      Solak, E. & Çokal, C. (2011). Algebraic break of image ciphers based on discretized chaotic map lattices. Information Sciences, 181(1), 227-233. doi:10.1016/j.ins.2010.09.009 [1]
      Solak, E., Çokal, C., Yıldız, O. T. & Bıyıkoğlu, T. (2010). Cryptanalysis of Fridrich's chaotic image encryption. International Journal of Bifurcation and Chaos, 20(5), 1405-1413. doi:10.1142/S0218127410026563 [1]
      Solak, E., Rhouma, R. & Belghith, S. (2010). Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications, 283(2), 232-236. doi:10.1016/j.optcom.2009.09.070 [1]
      Solak, E., Rhouma, R. & Belghith, S. (2011). Breaking an orbit-based symmetric cryptosystem. Mathematical and Computer Modelling, 54(5-6), 1413-1419. doi:10.1016/j.mcm.2011.04.012 [1]